ONINE SAFETY
When you’re in college, your computer and
mobile devices are primary tools in your
educational and social life. Students use
the Internet for homework, research, social
networking, online shopping and other activities.
The Internet is an amazing tool, but must be
used safely and securely.
When you log on to the campus network (or any
network), what you do online could impact not
only your computer, but other students and the
network as well. By combining up-to-date security
tools with good judgment, you and your college
community are much less likely to encounter
a security violation, loss of data, or system
problems.
Keep a Clean Machine
• Keep security software current: Having the
latest security software, web browser, and
operating system are the best defenses
against viruses, malware, and other online
threats.
• Automate software updates: Many software
programs will automatically connect and
update to defend against known risks. Turn
on automatic updates if that’s an available
option.
• Protect all devices that connect to the
Internet: Along with computers, smart
phones, gaming systems, and other web-
enabled devices also need protection from
viruses and malware.
• Plug & scan: “USBs” and other external
devices can be infected by viruses and
malware. Use your security software to scan
them.
Protect Your Personal Information
• Secure your accounts: Ask for protection
beyond passwords. Many account providers
now offer additional ways for you verify who
you are before you conduct business on that
site.
• Make passwords long and strong: Combine
capital and lowercase letters with numbers
and symbols to create a more secure
password.
• Unique account, unique password: Separate
passwords for every account helps to thwart
cybercriminals.
• Write it down and keep it safe: Everyone
can forget a password. Keep a list that’s
stored in a safe, secure place away from your
computer.
• Own your online presence: When available,
set the privacy and security settings on
websites to your comfort level for information
sharing. It’s ok to limit who you share
information with.
Connect With Care
• When in doubt, throw it out: Links in email,
tweets, posts, and online advertising are
often the way cybercriminals compromise
your computer. If it looks suspicious, even if
you know the source, it’s best to delete or if
appropriate, mark as junk email.
• Get savvy about Wi-Fi hotspots: Limit the
type of business you conduct and adjust the
security settings on your device to limit who
can access your machine.
• Protect your $$: When banking and shopping,
check to be sure the site is security enabled.
The first step is STOP. THINK. CONNECT.
LI S
6